Results 21 to 30 of about 26,053 (287)

Space and Time-Efficient Quantum Multiplier in Post Quantum Cryptography Era

open access: yesIEEE Access, 2023
This paper examines the asymptotic performance of multiplication and the cost of quantum implementation for the Naive schoolbook, Karatsuba, and Toom-Cook methods in the classical and quantum cases and provides insights into multiplication roles in the ...
Dedy Septono Catur Putranto   +3 more
doaj   +1 more source

Trusted Noise in Continuous-Variable Quantum Key Distribution: a Threat and a Defense [PDF]

open access: yes, 2016
We address the role of the phase-insensitive trusted preparation and detection noise in the security of a continuous-variable quantum key distribution, considering the Gaussian protocols on the basis of coherent and squeezed states and studying them in ...
Filip, Radim, Usenko, Vladyslav C.
core   +5 more sources

Random Oracles in a Quantum World [PDF]

open access: yes, 2011
The interest in post-quantum cryptography - classical systems that remain secure in the presence of a quantum adversary - has generated elegant proposals for new cryptosystems.
C.H. Bennett   +25 more
core   +3 more sources

Evaluation of Post-Quantum Distributed Ledger Cryptography

open access: yesThe Journal of The British Blockchain Association, 2019
This paper evaluates the current cybersecurity vulnerability of the prolific use of Elliptical Curve Digital Signature Algorithm (**ECDSA**) cryptography in use by the Bitcoin Core, Ethereum, Bitcoin Cash, and enterprise blockchains such as Multi-Chain ...
Robert Campbell Sr.
doaj   +2 more sources

Quantum key distribution based on selective post-processing in passive optical networks [PDF]

open access: yes, 2014
One of the main obstacles to the widespread adoption of quantum cryptography has been the difficulty of integration into standard optical networks, largely due to the tremendous difference in power of classical signals compared with the single quantum ...
Ciurana Aguilar, Alex   +2 more
core   +3 more sources

Deploying hybrid quantum-secured infrastructure for applications: When quantum and post-quantum can work together

open access: yesFrontiers in Quantum Science and Technology, 2023
Most currently used cryptographic tools for protecting data are based on certain computational assumptions, which makes them vulnerable with respect to technological and algorithmic developments, such as quantum computing.
Aleksey K. Fedorov, Aleksey K. Fedorov
doaj   +1 more source

Isogeny-based post-quantum key exchange protocols [PDF]

open access: yes, 2020
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH), a post-quantum key exchange protocol which security lies on the isogeny-finding problem between supersingular elliptic curves.
Sorinas Capdevila, Ernest
core  

Cloud Computing in the Quantum Era [PDF]

open access: yes, 2019
Cloud computing has become the prominent technology of this era. Its elasticity, dynamicity, availability, heterogeneity, and pay as you go pricing model has attracted several companies to migrate their businesses' services into the cloud.
Kaiiali, Mustafa   +2 more
core   +2 more sources

HybridPKE: A forward-secure non-interactive quantum-safe hybrid key exchange scheme

open access: yesEngineering Science and Technology, an International Journal, 2022
The schemes submitted to NIST call for standardization of post-quantum cryptography have some common drawbacks in terms of decryption failure probability, scalability, and switching issues from pre-quantum to post- quantum cryptography. In this paper, we
Simran Choudhary, Anil Gupta
doaj   +1 more source

The Case for Quantum Key Distribution [PDF]

open access: yes, 2009
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures.
A.R. Dixon   +20 more
core   +8 more sources

Home - About - Disclaimer - Privacy